• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

BTEC National in IT Organisational systems security - Software and network security (P3,M2,D1)

Extracts from this document...


1. Software and network security Handshaking: This is the process in which when a computer tries to establish a connection with another computer or device defines the rules for communication. Handshaking makes it possible for two computers or devices to connect without the need of human intervention to set parameters or rules of communication. Handshaking is the steps or verifying the connection, speed or authorization of the computer or device trying to connect to it. Diskless networks: This is where the computer at the workstation doesn?t have any form of data storage and depends on another computer such as a server to load its operating system and to access data over a network connection. This is useful as it is easy to transfer data from a computer to a mobile storage device and removes the vulnerability of PC?s in the workstation. This can also be done over the ?cloud? using applications that emulate the behaviour of your computer system. Use of backups: This is where data is copied to another storage device to ensure the data is safe and secure should system failures occur. ...read more.


This is done by the use of a tunnel which is an agreed route for encrypted traffic. This creates a trusted connection on a system which is not trusted. This helps prevent packet sniffing and fraudulent authentication. Intrusion detection systems: This monitors network activity for someone trying to break in or compromise a system. Some of these systems are passive and will record any suspicious activity for the network administrator and others are reactive which will try to reconfigure the firewall automatically to block the intrusion. Passwords: This is a word that must be entered to allow access to the system which is chosen by the user. Many organisations have password policies, for example, not to write down the password, change the password every month or so or to choose a password which is not contained within a dictionary. Many systems will lock a user out after 3 password attempt, then the user must go to the network administrator and provide suitable proof of identity and either remind the user of the password or create a new one. ...read more.


If the data or information has been backed up in an external media device in a safe place such as on an optical disc or on paper then the required data/information only needs to be retrieved from its safe location and the data/information is recovered, this reduces the downtime resulting from the disaster. Another form of disaster recovery is the use of a system backup, which is a mirror image of the computer systems used by the business; this means if there is a failure with one or all of the systems then the backup system can be put in place to prevent downtime caused by the failure. If damage occurs to the hardware of the system then spare parts that are kept in case of hardware failure are a good idea, however this is not very cost effective. Alternatively, in the case of a fire or flood and an entire system has been made unusable then a whole system replacement may be required, this may be stored as a backup in a safe place or bought in reaction to the disaster, this is the least effective way to prevent downtime. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. Marked by a teacher

    An introduction to Identity Theft

    4 star(s)

    A contact name of an employee has been acquired by the criminal via a brief telephone call to the receptionist of the company merely enquiring as to who would authorise any advertising. The invoice is then potentially followed up by any or all of the following; demand letters, threats of

  2. Peer reviewed

    information systems assignment 2

    4 star(s)

    sure it is kept secure * do not show information to other people * do not allow access by others the information can be hacked online on the computers meaning other people will gain the customer information, this is not complying with the Data Protection Act meaning they are in

  1. Peer reviewed

    Organisational system security - The possible security issues which exist within the FilmPoster.com system

    3 star(s)

    posters, asking them to dial a number in regards to their details such as bank accounts and once the number has been dialled, the customer is told to enter their account details and PIN's. Phishing is mainly carried out using email or instant messaging directing users to enter their details

  2. Computer systems assignment 1

    Task 2 Purpose features and functions of two operating systems Windows XP- It's an operating system which was created by Microsoft in 2001 and was a great success. This operating system is made for ordinary people performing basic tasks but is capable of much more.

  1. GCSE I.T Security Case Study - Riverside Leisure Centre

    parent's religious beliefs preventing their child's right to hospital treatment and life. * Or where processing is necessary for legal reasons, e.g. obtaining legal advice, exercising or defending legal rights, for the administration of justice. Or * The processing is carried out as part of the lawful activities of any non-profit making political, philosophical, religious, or trade union organisation.

  2. Smart Card System

    We can view our applications by package, object, and member (or bean patterns), as well as apply filters to customize what is displayed. Forte for Java also provides CVS (Concurrent Version System) support, Javadoc support, special supports for JavaBeans components and etc.

  1. With diagrams compare and contrast the relative advantages and disadvantages of digital transmission over ...

    The trouble with an analogue audio signal is that its exact shape has to be preserved if you are to hear the music exactly as it was when it was played. If there were a means of transmitting the signal so that only the overall shape of the signal mattered, then noise would not be so important.

  2. BTEC National in IT Organisational systems security - Policies and guidelines for IT security ...

    The procedures must be regularly reviewed and updated, these updates need to reflect what was outlined to be improved in the review and needs to be in date with current knowledge on security threats. However, the update may have a negative impact on the existing systems and so should be tested before applied to the entire organisations systems.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work